- UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Engineer is a valuable member of the IT Security Team and responsible for planning and designing security solutions and capabilities that enable the organization to identify, protect, detect, respond,and recover from cyber threats and vulnerabilities.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have solid working experience in designing secure network architectures, virtualization technologies, MySQL/MSSQL database platforms, identity and access management principles, application security, encryption technologies, DNS, web applications, ADFS, Nessus.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber-Engineering and Security Automation team is responsible to build and operate security services across the domains of cybersecurity like Product Security Engineering, Identity and Access Engineering, Governance and Risk Engineering, Privacy Engineering, Vulnerability Management detection and remediation automation, Cloud security engineering, 3rd party risk, and Detection & Response automation.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience. Mature Cyber Zero Trust Architecture (ZTA) capabilities to improve Vulnerability Threat Management capabilities.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Modern Management - Mobility and Security Solutions in any of the following: Microsoft Intune; Autopilot, Desktop Analytics, Conditional Access, identity governance, Azure Active Directory (AAD), Microsoft Cloud App Security (MCAS); Advanced Threat Analytics; Defender for O365, Microsoft Endpoint Configuration Manager.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Desired experience Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience. Mature Cyber Zero Trust Architecture (ZTA) to improve Vulnerability Threat Management capabilities.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Global Identity Engineering team, has an opening for a Senior IAM Engineer to deliver and manage large, complex programs in the areas of Provisioning/De-provisioning, Role Engineering, Directory, Highly Privileged Accounts, Identity Governance and Access (IGA), Single Sign On, Analytics, API Management and access certifications.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must be well versed in Cyber Security Tools, network topologies, intrusion detection, Public Key Infrastructure (PKI), and secured networks. IT experience with Cyber Security Policy and threat mitigation.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GRAIL is seeking a Senior IT Security Engineer to implement the IT Security Roadmap with scripting and automation, and an emphasis on identity management and access control in Okta. This role involves engaging with stakeholders and partners to deliver and operate in production.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience in Cyber Security Tools, network topologies, intrusion detection, Public Key Infrastructure (PKI), ZTA, and secured networks. Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cyber security.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
INFOSEC Certifications: CISSP, CCSP, CISM Azure/AWS/Google Training and Certification Microsoft Certifications/Exams a recommended: Sc-100 Cybersecurity Architect; Sc-300 Identity and Access Administration; AZ-500 Azure Security Engineer Crowdstrike Falcon EDR for Azure Managing/maintaining FISMA compliance for a government information system in accordance with requirements from NIST. OpenText Fortify experience is a plus.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Formal Education Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cyber security.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As the DevSecOps Engineer at the Joint Cyber Training Enterprise (JCTE) team, you will be at the forefront of ensuring the security, functionality, and efficiency of our cyber ranges.
ExpandApply NowActive JobUpdated 8 days ago
cyber security engineer identity access management jobs
FEATURED BLOG POSTS
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.